TSCM and Eavesdropping Detection Services
New York area headquarters
Services available worldwide


Information Protection and Privacy Assurance
for Business, Government
and at-risk Individuals



     • FAQs

     • Estimate Worksheet

     • Contact

About Us

     • Qualifications

     • Instrumentation

     • Subcontracting

     • Innovations

     • Staff

     • Client Reviews

     • Comparison Chart

     • Operating Policy

General Information

     • Downloads

     • Insider Tips

     • Ask questions

     • 100+ Spybuster Tips

     • One Minute TSCM Quiz

     • MoviesCartoons

     • Books

     • Eavesdropping History

Spy News from New York
Kevin's Security Scrapbook

This appears if user doesn't have JavaScript enabled, or doesn't have the required Flash Player version.

Eavesdropping Detection and Counterespionage Consulting enquiries are invited from corporate, government and professional security entities.

TSCM Eavesdropping Detection and TSCM Services US FlagFor federal procurement purposes, U.S. Government regulations classify Murray Associates Counterespionage as a Small Business, Professional Consulting Firm.

Registered Vendor:
• National Security Agency (NSA ARC)
• DoD - CCR
• Exostar SourcePass
• Jones Lang LaSalle
• ISNetworld
• Ariba

Spybusters, LLC dba
Murray Associates
PO Box 668
Oldwick, NJ 08858

Certified Protection Professional CPP TSCM

Certified Information Security Manager - CISM TSCM

Certified Fraud Examiner CFE TSCM

International Association of Professional Security Consultants - IAPSC TSCM

American Society for Industrial Security ASIS TSCM

HTCIA logo

InfraGard Logo

Use of this site indicates acceptance of Terms of Use, Linking, and Privacy Statements.

Copyright 1996-2014, Spybusters, LLC (140209)

What else do I need to know about Murray Associates?

Scary is not professional...
Which is why you won't see any spy vans with spooky signs or vanity plates. No shoulder holsters, guns, mirrored sunglasses or hokey doctor smocks. We arrive at your location as simply ordinary visitors with a few plain cases.

As invited guests to your premises, we always act accordingly. Low key in demeanor, dressed to blend in. We do not disrupt the normal flow of business, or appear out of place after-hours. Our special blend of professionalism, tact and courtesy is especially appreciated by clients who trust us to inspect their homes.

Equally important is our ability to conduct our work at your convenience. This means evenings, weekends and even most holidays... at no extra charge.

Honest fees...
You can trust our estimates too. Our rates are exact. You know the cost before we arrive. No nebulous guesses. No surprises.

The protection lasts...

After our sweep is complete and all the phones have been discreetly sealed with security tape (serial numbered to your assignment), a confidential report is sent to you via FedEx.

Your detailed report contains:

Our findings.
Recommendations for increasing your security and privacy.
Sources for items necessary to fulfill recommendations.
A full description of tests conducted.
An inventory of the areas checked.

This very informative and valuable report is also proof of:

An independent information security audit.
Your due diligence.
Fulfilling the business-secrets test... required by the court.
(Business information is not automatically protected by law.)

We back you all the way...
Our findings can be entered as evidence in legal proceedings. We will also act as your 'expert witness.'

Electronics and telecommunications is a rapidly changing field. Some of the devices we search for, other “experts” don’t even know exist. Full-time dedication and current knowledge are mandatory. Just one missed eavesdropping device, or espionage trick, can render the sweep process worthless.

Cheap sweeps, cursory searches, and/or do-it-yourself eavesdropping detection gadgets, will only provide a false sense of security. Don’t be fooled into buying an inferior service for your company, agency or client.

You will never be able to justify the savings when the next leak occurs. Never.

SSL Certificates